Catalog Search Results

Reading recommendations for fiction, nonfiction, and audiobooks across all reading levels.
Author
Series
Description
Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress....
2) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
As always, Reacher has no particular place to go, and all the time in the world to get there. One morning he ends up in a town near Pleasantville, Tennessee. But there's nothing pleasant about the place. In broad daylight Reacher spots a hapless soul walking into an ambush. 'It was four against one' so Reacher intervenes, with his own trademark brand of conflict resolution. The man he saves is Rusty Rutherford, an unassuming IT manager, recently fired...
Author
Description
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow...
Author
Description
Understand cybersecurity essentials with ease
Key Features
Align your security knowledge with industry leading tools and concepts
Gain the skills and certifications required to keep up with ever-changing security needs
Learn from industry experts how to analyze, implement, and maintain a robust environment
Book Description
It's no secret that there is a huge talent gap in the cybersecurity industry. Everyone, including some of the Fortune 500 CEOs,...
5) Zero days
Author
Appears on these lists
ATL: 2024 Book Club Reads
Bedford Public Library Most Checked Out of 2023
Bedford Public Library Staff's Favorite Reads of 2023
Race Against Time (Bedford)
Bedford Public Library Most Checked Out of 2023
Bedford Public Library Staff's Favorite Reads of 2023
Race Against Time (Bedford)
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Description
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network. BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance...
Author
Series
Formats
Description
"It's impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it's going, while providing vivid case studies illustrating how to become one of these "white hats" who specializes in ensuring the security of an organization's information systems....
Author
Description
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business's true security posture. Learn effective...
Author
Description
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsAbout This Book Learn how to build your own pentesting lab environment to practice advanced techniques Customize your own scripts, and learn methods to exploit 32-bit and 64-bit programs Explore a vast variety of stealth techniques to bypass a number of protections when penetration testingWho This Book Is For This book is for anyone who wants to...
Author
Formats
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Author
Series
Formats
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
Author
Description
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage
Key Features
Build, manage, and measure an offensive red team program Leverage the homefield advantage to stay ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets…
It's now more...
Author
Series
Tom Clancy's Net Force (Adult series) volume 11
Formats
Description
"The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
Author
Description
The news is filled with stories of data breaches at companies and of threats to national security as hackers interfere with elections. It's more important than ever for internet users to know how to maintain their privacy online. The digital world has become inescapable, and to be a responsible digital citizen, it is necessary to be aware of the threats to your online privacy and security. This book looks at the legal and illegal forms of cyberspying,...
Author
Formats
Description
"From cybersecurity expert and former CIA hacker Eric Cole, Cyber Crisis explains why cybersecurity should be the top concern for all professionals and offers actionable advice that anyone can implement on regular basis for increased safety and protection."-- Provided by publisher.
17) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime."-- Provided by publisher.
18) Learn social engineering: learn the art of human hacking with an internationally renowned expert
Author
Description
Improve information security by learning Social Engineering.
Key Features
Learn to implement information security using social engineering
Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on
Practical approach towards learning social engineering, for IT security
Book Description
This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat...
Author
Description
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!About This Book Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town--Kali Linux 2 (aka Sana). Experience this journey with new cutting-edge wireless penetration...
Author
Description
This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You'll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You...